13 Reference
13 Reference
13 Reference
3. Axel, B., Barbara, E., Alice, H., Wilmuth, M. and Martin, W. “A Test
Suite for the Evaluation of Mobile Agent Platform Security”,
Proceedings of the IEEE/WIC/ACM International Conference on
Intelligent Agent Technology (IAT'06), pp. 752-756, 2006.
13. Farmer, W., Guttman, J. and Swarup, V. “Security for Mobile Agents:
Issues and Requirements”, Proceedings of the 9th National Information
Systems Security Conference, pp. 591-597, Baltimore, October 1996.
19. Gray R. S., Cybenko G., Kotz D., Peterson R.A. and Rus D.
“D’Agents: Applications and Performance of a Mobile Agent System
Software-Practice and Experience”, Vol. 32, No. 6, pp. 543-573, May
2002.
20. Hacini, S., Zahia, G. and Boufaida, Z. “TAMAP: a New Trust-based
Approach for Mobile Agent Protection”, Journal in Computer
Virology, Vol. 3 No. 4, pp. 267-283, 2007.
34. Karnik, N.M. and Tripathi, A.R. “Security in the Ajanta Mobile Agent
System”, Technical Report TR-5-99, University of Minnesota,
Minneapolis, MN 55455, U.S.A. 1999.
37. Kuang, H., Bic, L.F. and Dillencourt, M.B. “Iterative Grid-based
Computing Using Mobile Agents”, Proceedings of the International
Conference on Parallel Processing (ICPP ’02), pp. 109-117, 2002.
38. Kumari, V., Aditya Kumar, Y., Raju, K.V.S.V.N., Ramana, K.V. and
Prasad, R.V.V.S.V. “Policy Based Controlled Migration of Mobile
Agents to Untrusted Host”, Proceedings of the 3rd International
Conference on Intelligent Information Hiding and Multimedia Signal
Processing (IIHMSP- 2007), pp. 550-553, 2007.
41. Lange, D.B. “Mobile Object and Mobile Agents: The future of
Distributed Computing”, Proceedings of the European Conference on
Object Oriented Programming (ECOOP’98). Brussels, Belgium,
Invited Talk, 1998.
42. Levy, R., Carlos, P.S., Teittinen, A., Haynes, L.S. and Graff, C.J.
“Mobile Agents Routing – a Survivable ad-hoc Routing Protocol”,
Proceedings of the IEEE military communications conference
(MILCOM ’05), IEEE Computer Society, Vol. 5, pp. 2903-2909,
2005.
43. Libes, D. “Obfuscated C and Other Mysteries”, John Wiley and Sons,
USA, Book and Disk Edition, 1992.
45. Lu, T. and Fu, M. “Using Mobile Agents for Object Sharing in P2P
Networks”, Proceedings of the 1st International Conference on
Innovative Computing, Information and Control (ICICIC ’06), Vol. 1,
pp. 741-744, 2006.
46. Ma, L., Jeffrey, J. and Tsai, J. P. “Security Modeling and Analysis of
Mobile Agent Systems”, Imperial College Press, 2006.
47. Malkhi, D. and Reiter, M.K. “Secure Execution of Java Applets Using
a Remote Playground”, Proceedings of the 1998 IEEE Symposium on
Security and Privacy, Oakland, CA, pp. 40-51, 1998.
48. Manvi, S.S. and Venkataram, P. “Mobile Agent Based Approach for
QoS Routing”, IET Communication, Vol. 1, No. 3, pp. 430-439, 2007.
50. Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S.,
Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C.,
Virdhagriswaran, S. and White, J. “MASIF: The OMG Mobile Agent
System Interoperability Facility”, Proceedings of the Second
International Workshop, MA'98, LNCS, Vol. 1477, pp. 50-67.
Springer - Verlag, 1998.
52. Minsky, Y., Renesse, R.V., Schneider, F.B. and Stoller, S.D.
“Cryptographic support for fault-tolerant distributed computing”,
Proceedings of the 7th ACM SIGOPS European Workshop, ACM
Press, USA, pp. 109-114, 1996.
56. Ordille, C., Benjamin, G., Colin, H., David, L., Colin, P. and Gene, T.
“Itinerant Agents for Mobile Computing”, IEEE Personal
Communications, Vol. 2, No. 5, pp. 34-49, 1995.
57. Ordille, J.J. “When Agents Roam, Who Can You Trust?”, Proceedings
of the First Conference on Emerging Technologies and Applications
in Communications, Portland, Oregon, pp. 188-191, 1996.
58. Pals, H., Petri, S. and Grewe, C. “FANTOMAS – Fault Tolerance for
Mobile Agents in Clusters”, Proceedings of International Parallel and
Distributed Processing Symposium (IPDPS 2000), pp. 1236-1247,
2000.
60. Pears, S., Xu, J. and Boldyreff, C. “Mobile Agent Fault Tolerance for
Information Retrieval Applications: An Exception Handling
Approach”, Proceedings of Sixth International Symposium on
Autonomous Decentralized Systems (ISADS’03), pp. 115-124, 2003.
61. Picco, G.P. “Mobile agents: An Introduction”, Journal of
Microprocessors and Microsystems, Vol. 2, No. 2, pp. 65-74, 2001.
68. Ruchuan, W., Kaicui, S., Dengying, S. and Liyang, Y. “The Research
of Mobile Agent Protection Based on JavaCard”, Chinese Journal of
Computers, Vol. 24, No. 4, pp. 492-499, 2004.
80. Tay, B.H. and Ananda, A.L. “A Survey of Remote Procedure Calls’,
ACM SIGOPS Operating Systems Review, Vol. 24, No. 3, pp. 68-79,
1990.
81. Tripathi, A.R., Karnik, N.M., Vora, M.K, Ahmed, T. and Singh, R.D.
“Mobile Agent Programming in Ajanta”, Proceedings of 19th
International Conference on Distributed Computing Systems
(ICDCS’99), Austin, Texas, pp. 190-197, 1999.
82. Tripathi, A.R., Ahmed, T. and Karnik, N.M. “Experiences and Future
Challenges in Mobile Agent Programming”, Microprocessors and
Microsystems, pp. 121-129, 2001.
89. Venkatesan, S., Baskaran, R., Chellappan, C., Anurika Vaish and
Dhavachelvan, P. “Artificial Immune System Based Mobile Agent
Platform Protection”, International Journal on Computer Standards
and Interfaces, Elsevier Standards, Vol.35, No.4, pp.365-373, June
2013.
92. Wahbe, R., Lucco, S., Anderson, T.E. and Graham, S.L. “Efficient
Software-based Fault Isolation”, ACM SIGOPS Operating Systems
Review, Vol. 27, No. 5, pp. 203-216, 1993.
94. Wenyu Qu, Masaru Kitsuregawa, Hong Shen and Zhiguang Shan, “A
Novel Fault-Tolerant Execution Model By Using of Mobile Agents”,
Journal of Network and Computer Applications, Elsevier Standards,
Vol.32, No.2, pp.423 - 432, March 2009.
95. Wong, D., Paciorek, N., Walsh, T., DiCelie, J., Young, M. and Peet, B.
“Concordia: An Infrastructure for Collaborating Mobile Agents”,
Rothermel K. and Popescu-Zeletin R. (Eds.), Proceedings of
1st International Workshop on Mobile Agents (MA'97), LNCS, Berlin,
Germany, Vol. 1219, pp. 86-97, 1997.
96. Wong, T.Y., Chen, X. and Lyu, M.R. “Design and Evalution of
a Fault Tolerant Mobile Agent System”, IEEE Intelligent Systems,
Vol. 3, No. 3-4, pp. 32-38, 2004.
99. Xian, H. and Feng, D. “Protecting Mobile Agents Data using Trusted
Computing Technology”, International Journal of Communication and
Computer, Vol. 4, No. 3, pp. 44-57, 2007.
100. Xiaoping, W., Shen, Z. and Zhang, H. “The Mobile Agent Security
Enhanced by Trusted Computing Technology”, Proceedings of
Wireless Communications, Networking and Mobile Computing
(WiCOM 2006), Wuhan, pp. 1-4, 2006.
101. Xu, D., Harn, L., Narasimhan, M. and Luo, J. “An Improved Free-
Roaming Mobile Agent Security Protocol against Colluded Truncation
Attacks”, Proceedings of the 30th Annual international Computer
Software and Applications Conference(COMPSAC’06), Vol. 2,
pp. 309-314, 2006.
103. Yao, M., Foo, E., Dawson, E.P. and Peng, K. “An Improved Forward
Integrity Protocol for Mobile Agents”, Proceedings of 4th
International Workshop on Information Security Applications (WISA
2003), LNCS, Vol. 2908, pp. 272-285, 2003.
104. Yee, B.S. “A Sanctuary for Mobile Agent”, Technical Report CS97-
537, UC San Diego, Department of Computer Science and
Engineering, 1997.
105. Zhong, X., Zhong, X.C. and Shen, H. “A Reliable and Secure
Connection Migration Mechanism for Mobile Agents”, Proceeding of
24th International Conference on Distributed Computing Systems
Workshops - W4: MDC (ICDCSW'04), pp. 548-553, 2004.
106. Zhou, J., Onieva, J. and Lopez, J. “Analysis of a Free Roaming Agent
Result-Truncation Defense Scheme”, Proceedings of 2004 IEEE
Conference on Electronic Commerce, San Diego, USA, IEEE
Computer Society Press, pp. 221-226, 2004a.
107. Zhou, J., Onieva, J. and Lopez, J. “Protecting Free Roaming Agents
Against Result-Truncation Attack”, Proceedings of 60th IEEE
Vehicular Technology Conference, Los Angles, USA, pp. 3271-3274,
2004b.